Zero-day vulnerabilities enable attackers to penetrate a network infrastructure without warning. Solution providers can offer a valuable service by helping customers mitigate zero-day vulnerabilities. But it's not as simple as it sounds. In this tip...
Continue Reading

Microsoft's newest version of Windows is expected to be released this year. Windows 7 features several security updates and new features that solution providers should familiarize themselves with prior to the release.
Continue Reading

The down economy means many of your customer companies are going to go through layoffs. Kevin McDonald explains why and how to maintain your customers' security amid layoffs, and what the consequences are if you do not.
Continue Reading

During hard times, it's important to go the extra mile to accommodate anything your customer may need. Rounding out your security offerings can make you invaluable to customers. Consider offering options such as vulnerability scans, pen testing and ...
Continue Reading

Several serious data breaches have been highlighted in the news lately, making data loss prevention a hot topic for security managers and solution providers alike. Allen Zuk explains how data breaches occur and what you can do to better protect your...
Continue Reading

Learn how to deal with war walking and driving, common wireless access point vulnerabilities and countermeasures, and wireless testing tools in this installment of the Vines penetration testing series.
Continue Reading

Metasploit is an indispensable penetration testing tool that provides a solution to information security issues from exploit conception to execution, and channel professionals need to know when, why and how to use it.
Continue Reading

In addition to a basic network scan, Nmap can run specific scans that exploit idiosyncrasies in platforms or protocols. Learn how to run these scans and tell the difference betweeen open and closed ports on your customer's network.
Continue Reading

Using DNS blacklists to prevent spam can be tricky. This tip provides value-added resellers (VARs) and security consultants with the pros and cons of using DNS blacklists and recommends three blacklists with useful features.
Continue Reading